General

  • Target

    1064-140-0x0000000000400000-0x000000000043A000-memory.dmp

  • Size

    232KB

  • MD5

    0250442c4bd6c6844c20d03b4db2eef6

  • SHA1

    5e079fa361d6665e2b45c5ca8154dd267ba2cf7d

  • SHA256

    6ba0b6968897dd31e8dc0c62ec1ab22a3d11f3b49fddb294e8b4d8b68cc1ba28

  • SHA512

    98dab177ab00a4ad8f35c11fef01113c684ef4167b61648af30ec1257c7f8f2c8c252f3083de18302cf0821f295059c8ad236bdd66df6a6881adddf2c52d33cc

  • SSDEEP

    3072:Qq2IOdYQMKMiOWgBBsC2XauFSSvUMHVFjkASu4S9FgPfefGKKFHiTJYoaG0N:5210BsC2XxhUMHVF7x9F4fUKHm7a

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.alonsorojasmudanzasnacionales.com/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    SWIrh1JT66[P

Signatures

Files

  • 1064-140-0x0000000000400000-0x000000000043A000-memory.dmp
    .exe windows x86


    Headers

    Sections